default search action
8th CSFW 1995: Dromquinna Manor, Kenmare, County Kerry, Ireland
- The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland. IEEE Computer Society 1995, ISBN 0-8186-7033-9
Composition
- Aris Zakinthinos, E. Stewart Lee:
The composability of non-interference [system security]. 2-8 - A. W. Roscoe, Lars Wulf:
Composing and decomposing systems under security properties. 9-15 - Alfred P. Maneki:
Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models. 16-
Authentication Protocols
- Li Gong:
Optimal authentication protocols resistant to password guessing attacks. 24-29 - Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Key distribution without individual trusted authentification servers. 30-
Analysis of Cryptographic Protocols
- Colin Boyd:
Towards a classification of key agreement protocols. 38-43 - Wenbo Mao:
An augmentation of BAN-like logics. 44-
Issues in Implementations
- Riccardo Focardi, Roberto Gorrieri, V. Panini:
The security checker: a semantics-based tool for the verification of security properties. 60-69 - Trent Jaeger, Atul Prakash:
Implementation of a discretionary access control model for script-based systems. 70-84 - John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg:
Building higher resolution synthetic clocks for signaling in covert timing channels. 85-
Models of Cryptographic Protocols
- A. W. Roscoe:
Modelling and verifying key-exchange protocols using CSP and FDR. 98-107 - James W. Gray III, John McLean:
Using temporal logic to specify and verify cryptographic protocols. 108-
Secure Systems
- Iwen E. Kang, Thomas F. Keefe:
Concurrency control for federated multilevel secure database systems. 118-135 - Simon N. Foley, Jeremy Jacob:
Specifying security for CSCW systems. 136-
Information Flow
- Paul F. Syverson, James W. Gray III:
The epistemic representation of information flow security in probabilistic systems. 152-166 - William R. Bevier, Richard M. Cohen, William D. Young:
Connection policies and controlled interference. 167-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.